top of page


Holiday Fraud Is Just the Beginning: How Criminals Use Peak Season to Build Sleeper Accounts for Year-Round Abuse
Yes, criminal activity spikes during peak shopping season. But the most damaging fraud often doesn’t happen in November or December. It happens months later, after the holidays have passed and attention has shifted, using accounts that were created, compromised, or harvested during peak volume. Fraudsters don’t treat the holidays as a sprint, they treat them as account setup season. Fraudsters use the holidays to set up sleeper accounts and synthetic identities, and to harves
Don Bush
Jan 135 min read


The Klarna Wake-Up Call: Why Ignoring Email Authentication Is a Disaster Waiting to Happen
Klarna is just now learning what many in fraud prevention have known for years: synthetic identity fraud doesn’t start with stolen credit cards, it starts with unvetted digital identities. For years, email addresses have been treated as little more than a communication channel, a box to check during account creation. That assumption is now proving to be dangerously outdated . Email is often the first persistent identifier tied to consumer, vendor, and partner accounts. When e
Don Bush
Jan 73 min read


The Critical Visibility Gap Between Marketplace Data and Checker, Real-Time Data Intelligence
Across the payments ecosystem, criminals need validated, “live” cards because stolen cards are the fuel for almost every form of online payment fraud. The sooner they confirm which cards work, the sooner they can monetize them and fraud can hide more easily. These cards include traditional consumer Visa and Mastercard branded cards from issuing banks, private label, commercial, and even gift cards. But here’s the problem: many organizations, including banks, don’t see these
Don Bush
Nov 26, 20253 min read


Email Hygiene: A Hidden Lever in Reducing Fake Accounts & Improving Business Metrics
Every executive decision relies on trustworthy numbers. Metrics like CAC (Customer Acquisition Cost), CLTV (Customer Lifetime Value),...
Don Bush
Sep 24, 20253 min read


The Real Economics of Credential Stuffing: Low Success, High Impact
(Excerpts from the recently published Special Report, “ The Economics of Credential Stuffing Attacks and Account Takeover Fraud ” by...
Don Bush
Sep 10, 20252 min read


Is Your Business a Target for Credential Stuffing?
Credential stuffing is a serious cyberattack because it’s cheap, easy to scale, and takes advantage of the common problem of people...
Don Bush
Sep 5, 20251 min read


Mind the Gap in Your Verification Analysis
Bridging the Divide Between Breach Data and Actionable Intelligence It has been a year since the massive AT&T data breach shook the...
Don Bush
Aug 27, 20252 min read


The Achilles' Heel of Online Security: Why Passwords Leave Companies Vulnerable
In our digital-first world, passwords, combined with an email address or User ID, are the primary gatekeepers to vast amounts of...
Don Bush
Jun 25, 20253 min read


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 28, 20253 min read


Verizon Report: Proactive Credential Screening - Your First Line of Cyber Defense
#credentialscreening, #ATOprevention, #VerizonDBIR, #cybersecurity
Don Bush
May 7, 20253 min read


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 2, 20252 min read


Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
Jen Baldwin
Feb 26, 20252 min read


Please Don't Block My Grandma Because My Fridge is Hacked! (Or, Why IP Blocking is Dumb)
Story time! Gather 'round and gain some wisdom.
#identityintelligence #bestpractice #fraudprevention
Jen Baldwin
Feb 5, 20252 min read
bottom of page
